Bug 75411 - kernel panic when start using VirtIO network in VM
Summary: kernel panic when start using VirtIO network in VM
Status: NEW
Alias: None
Product: Networking
Classification: Unclassified
Component: Other (show other bugs)
Hardware: All Linux
: P1 high
Assignee: Stephen Hemminger
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-05-03 18:10 UTC by Igor Raits
Modified: 2016-02-15 20:26 UTC (History)
2 users (show)

See Also:
Kernel Version: kernel-3.14.2-200.fc20.x86_64
Subsystem:
Regression: No
Bisected commit-id:


Attachments
Kernel panic screen (2.39 MB, image/jpeg)
2014-05-03 18:11 UTC, Igor Raits
Details
Kernel panic screen with rtl8139 (2.37 MB, image/jpeg)
2014-05-04 08:04 UTC, Igor Raits
Details

Description Igor Raits 2014-05-03 18:10:30 UTC
Steps to reproduce:
1. create VM (kvm)
2. add bridged(?) VirtIO network or e1000(?)
3. start using internet from VM

Actual results:
Kernel panic (screenshoot in attach)

Expected results:
all works OK

Additional info:
when I;ve used e1000 driver for VM I've got this bug: https://bugzilla.redhat.com/show_bug.cgi?id=1093708
Comment 1 Igor Raits 2014-05-03 18:11:17 UTC
Created attachment 134961 [details]
Kernel panic screen
Comment 2 Igor Raits 2014-05-04 07:58:06 UTC
I can reproduce with VM with linux bridged rtl8139
Comment 3 Igor Raits 2014-05-04 08:04:59 UTC
Created attachment 135061 [details]
Kernel panic screen with rtl8139

Sorry for screenshots. Dont have device to which I can forward panics.
Comment 4 Igor Raits 2014-05-04 08:06:25 UTC
at the same time I have in journal this strings:

https://bugzilla.redhat.com/show_bug.cgi?id=1093708

general protection fault: 0000 [#1] SMP 
Modules linked in: tun fuse xt_CHECKSUM nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE bnep bluetooth 6lowpan_iphc ip6t_rpfilter ip6t_REJECT xt_conntrack cfg80211 rfkill ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw vfat fat snd_hda_codec_hdmi x86_pkg_temp_thermal coretemp kvm_intel kvm snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel snd_hda_codec snd_hwdep atl1c crct10dif_pclmul crc32_pclmul crc32c_intel snd_seq snd_seq_device snd_pcm snd_timer snd ghash_clmulni_intel joydev iTCO_wdt tpm_tis iTCO_vendor_support tpm_infineon mei_me mei shpchp soundcore nfsd lpc_ich mfd_core auth_rpcgss i2c_i801 microcode serio_raw tpm nfs_acl lockd sunrpc nouveau mxm_wmi wmi i2c_algo_bit drm_kms_helper ttm drm i2c_core video
CPU: 1 PID: 1757 Comm: gnome-shell Not tainted 3.14.2-200.fc20.x86_64 #1
Hardware name: Gigabyte Technology Co., Ltd. To be filled by O.E.M./Z77-DS3H, BIOS F11a 11/13/2013
task: ffff880201b10000 ti: ffff880211f20000 task.ti: ffff880211f20000
RIP: 0010:[<ffffffff811cc965>]  [<ffffffff811cc965>] kmem_cache_alloc+0x75/0x1f0
RSP: 0018:ffff880211f21d88  EFLAGS: 00010246
RAX: 0000000000000038 RBX: ffff8800d233d000 RCX: 00000000000003b7
RDX: 000000000000f87a RSI: 00000000000000d0 RDI: ffff880216020000
RBP: ffff880211f21db8 R08: 0000000000017a90 R09: ffffffff811ae5aa
R10: 00000000000003b2 R11: ffff88020193dbc0 R12: 00008800d8e9d2c0
R13: 00000000000000d0 R14: ffff880216020000 R15: ffff880216020000
FS:  00007fa4ebbe0a40(0000) GS:ffff88021ec80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa4b90d2000 CR3: 00000000d9675000 CR4: 00000000001427e0
Stack:
 ffffffff811ae5aa ffff8800d233d000 0000000000000000 ffff8800d84fee60
 ffff88020310a5c0 0000000000000000 ffff880211f21df0 ffffffff811ae5aa
 ffff8800d233d000 ffff8800d84fee60 ffff88020310a5c0 0000000000000005
Call Trace:
 [<ffffffff811ae5aa>] ? anon_vma_fork+0x4a/0x100
 [<ffffffff811ae5aa>] anon_vma_fork+0x4a/0x100
 [<ffffffff81088df5>] copy_process.part.26+0x17e5/0x1b90
 [<ffffffff81089363>] do_fork+0xc3/0x370
 [<ffffffff81089696>] SyS_clone+0x16/0x20
 [<ffffffff816ff389>] stub_clone+0x69/0x90
 [<ffffffff816ff029>] ? system_call_fastpath+0x16/0x1b
Code: dc 00 00 49 8b 50 08 4d 8b 20 49 8b 40 10 4d 85 e4 0f 84 27 01 00 00 48 85 c0 0f 84 1e 01 00 00 49 63 46 20 4d 8b 06 41 f6 c0 0f <49> 8b 1c 04 0f 85 59 01 00 00 48 8d 4a 01 4c 89 e0 65 49 0f c7 
RIP  [<ffffffff811cc965>] kmem_cache_alloc+0x75/0x1f0
 RSP <ffff880211f21d88>

Note You need to log in before you can comment on or make changes to this bug.